[10143] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Linux-style kernel PRNGs and the FIPS140-2 test

daemon@ATHENA.MIT.EDU (Adam Fields)
Tue Jan 15 15:52:44 2002

Message-Id: <200201152041.g0FKfcl22455@sparkle.generation.net>
To: Thor Lancelot Simon <tls@reefedge.com>
Cc: cryptography@wasabisystems.com
From: Adam Fields <fields@surgam.net>
In-reply-to: Your message of "Tue, 15 Jan 2002 15:23:05 EST."
             <20020115152305.A17304@pla-muek.reefedge.com> 
Date: Tue, 15 Jan 2002 15:41:38 -0500


Thor Lancelot Simon says:
> Many operating systems use "Linux-style" (environmental noise
> stirred with a hash function) generators to provide "random"
> and pseudorandom data on /dev/random and /dev/urandom
> respectively.  A few modify the general Linux design by adding an
> output buffer which is not stirred so that bits which have already
> been output are not stirred into the pool of "new" "random" data
> (IMO, not doing this is insane, but that's a different subject).
[...]

Does the above description also apply to truerand, or is that subtly
different?
				- Adam

-----
Surgam, Inc. is a technology consulting firm with strong background in
delivering robust and scalable enterprise web and IT applications.
http://www.surgam.net



---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post